2020-07-14 07:14 PM
I'm sure many have heard about the recent DNS vulnerability titled SIGRed. This one looks pretty bad.
I'm curious about how to best leverage NetWitness Logs Packets and Endpoint to best be prepared to detect and response to this sort of attack.
One of the detection suggestions is to detect large malformed DNS requests, is this easy to do with NW?
2020-07-16 10:19 AM
Suggest looking at implementing logic as follows:
1) identifying DNS responses larger than 64 K bytes
- you could create an AppRule similar to this: service=53 && payload.res=64000-u
2) identifying DNS query type is SIG record
- this is currently parsed out as dns.querytype = 'sig record' {assuming you have the DNS_verbose_lua parser enabled}
You could combine all of this into a single AppRule
2020-07-17 01:28 AM
Thanks David,
I have a play around with what you suggested. Thanks.
2020-07-31 03:55 PM
From a querying standpoint are you using the session size buckets populated in the session analysis metakey? Or are you indexing payload response sizes?